Arik Friedman

Orcid: 0000-0002-4978-9407

According to our database1, Arik Friedman authored at least 32 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024

2023
Improving Agile Planning for Reliable Software Delivery.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

The Atlassian Data Lake: consolidating enriched software development data in a single, queryable system.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

2019
Continuous Data-driven Software Engineering - Towards a Research Agenda: Report on the Joint 5th International Workshop on Rapid Continuous Software Engineering (RCoSE 2019) and 1st International Works.
ACM SIGSOFT Softw. Eng. Notes, 2019

Bridging the Gap Between Business, Design and Product Metrics.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
The right metric for the right stakeholder: a case study of improving product usability.
Proceedings of the 30th Australian Conference on Computer-Human Interaction, 2018

2017
Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
A differential privacy framework for matrix factorization recommender systems.
User Model. User Adapt. Interact., 2016

2015
Privacy Aspects of Recommender Systems.
Proceedings of the Recommender Systems Handbook, 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

Applying Differential Privacy to Matrix Factorization.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

Rademacher Observations, Private Data, and Boosting.
Proceedings of the 32nd International Conference on Machine Learning, 2015

2014
Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

Secure Evaluation Protocol for Personalized Medicine.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

On the Effectiveness of Obfuscation Techniques in Online Social Networks.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Matrix Factorization without User Data Retention.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Privacy-Preserving Distributed Stream Monitoring.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.
Proceedings of the 2014 Internet Measurement Conference, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

Loki: A privacy-conscious platform for crowdsourced surveys.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Collaborative network outage troubleshooting with secure multiparty computation.
IEEE Commun. Mag., 2013

Differential privacy in intelligent transportation systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Exposing and mitigating privacy loss in crowdsourced survey platforms.
Proceedings of the 2013 workshop on Student workhop, 2013

Federated flow-based approach for privacy preserving connectivity tracking.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Is more always merrier?: a deep dive into online social footprints.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

2011
Privacy preserving data mining.
PhD thesis, 2011

2010
Data mining with differential privacy.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

2008
Providing <i>k</i>-anonymity in data mining.
VLDB J., 2008

2006
<i>k</i>-Anonymous Decision Tree Induction.
Proceedings of the Knowledge Discovery in Databases: PKDD 2006, 2006


  Loading...